Interview with Mayur Agnihotri

Email interview held on 22nd September 2017 – as follows between Alan Radley (questioner) and Mayur Agnihotri (relator):

  1. What are your thoughts on the current state of cybersecurity, both for organizations and for consumers?

While the coming of advanced innovation has powered new plans of action(business), it has additionally brought a component of risk as esteemed resources turn out to be less unmistakable, more circulated, and more powerless against digital threats.

Today, a wide range of sorts of digital  attackers debilitate associations, from people working alone to profoundly sorted out, very much supported groups for-enlist fit for rupturing the most modern cybersecurity frameworks target individual, corporate or state privileged insights. Cybersecurity today should incorporate a reexamining of the idea of security, and

a move from an approach that burdens securing vulnerable resources for one in light of fortifying resources, making them stronger as a component of an all encompassing cybersecurity process that conveys more prominent incentive to the undertaking.

FOUR GAPS UNDERCUT DIGITAL TRUST

  • Talent Gap
  • Budget Gap
  • Management Gap
  • Technology  Gap

Organizations need to convey those services in a protected way so that the consumer keeps on putting trust in its communication with you as an organization what’s more, with the products, (Cybersecurity turns into a piece of the texture of what these organizations offer both in products and services, as well as consumer trust.)

Organizations that integrate cybersecurity with advanced systems will be better ready to build trust with all that they do and change quicker,(Leading organizations are integrating cybersecurity, protection and ethics from the beginning. What’s more, that empowers them to better draw in with existing consumer and pull in new ones.)

To enhance training and awareness programs, organizations should set the tone from the best, making it truly about empowering the organization’s digital future and fighting cyber threat. Past these measures, organizations should create and update procedures to oversee security / privacy and compliance, and actualize or update an information utilize administration system, perform affect appraisals and guarantee that a current information security life cycle program is set up.

  1. What – in your estimation – are the reasons behind the many computer security breaches/failures that we see today?

“No One Is Completely Safe”

Security breaches continue to make big news. One of the latest patterns  is an expansion in ransomware/malware attacks targeted at organizations and businesses like hospitals and universities.

Security breach incidents don’t discriminate — they influence all businesses. Each organization ought to be always centered around  identifying, preventing, and having the correct abilities setup to react to information security incidents. Tolerating that breaches are  inescapable, doesn’t mean it’s not worth trying to stop them.

Here are the top 8 causes of data security incidents

  1. Phishing( Social Engineering)
  2. Employee mistake
  3. Internal theft
  4. External theft

5.Lost or improper disposal of data

  1. Physical attack
  2. Hacking or Malware
  3. Back Doors, Application Vulnerabilities
  1. Where do you go to find your “science” of cybersecurity?

As per my opinion science and cybersecurity is not different it’s just a point of view for me cybersecurity and science both are sexy, provokes curiosity, develop and improves technology/products and advances knowledge.

All Cybersecurity professional applies cyber security science in their domain/job either you are forensic investigator, network administrator or any other roles providing in cyber security.

Cybersecurity science is a critical part of the understanding, improvement, and practice with regards to cyber security. Cybersecurity is a broad classification, covering the innovation and practices used to protect  computers, networks and information from threat Individuals all through industry, the scholarly world, and government all utilization formal and casual science to make and extend cybersecurity information. As a teach, the field of cybersecurity requires genuine information to investigate and reason about the “how and why” we manufacture or deploy security controls.

I must wanna say that we seen science (engineering) knowledge applies in cybersecurity. On this topic where we find “science” of cybersecurity is really broad and we used “science” in our daily cyber security activities.

  1. Do you recommend a particular cybersecurity blog that our readers could follow?

Hmmmm that’s the very hard question …..for reading getting information regarding cybersecurity news, incidents i suggest to explore as much readers/users explorer internet, but i also must say to active basic alerts in your email inbox whatever mail service users/reader using example if you are using gmail so users must enable google alerts by which users/readers get incident news/information regarding cybersecurity stuff which ongoing in the cyber world.

  1. What keeps you up at night in the context of the cyber environment that the world finds itself in?

I find myself in the middle of cyber world every night as “ Learn”, “UnLearn” and “ReLearn”


Thank you kindly Mayur Agnihotri for taking the time out of what must be a busy schedule to answer our questions in such a  purposeful way.

Interviewee: Mayur Agnihotri,

AppSec India Co-Leader,

Item Writer at EC-Council,

Technical Committee- @D4n6J,

Member Executive Council @CIS_Defender.

Mayur Agnihoti – Biography

Hello and thank you for taking the time to view my profile.About me, i am just a learner and self-motivated. I’m Not a Master, I’m Still a Learner. NOBODY is Safe in Our Cyber World.Use Knowledge to Save Yourself & Your Country.Respect your Country’s Cyber Law. An Information Security Enthusiast, Who believes in Security and Not Just Compliance.

C|EH – Certified Ethical Hacker ,Cyber Security for Industrial Control Systems, Operational Security for Control Systems, Advanced Security In The Field, Basic Security In The Field ||, [ FEMA ] – Cyber Incident Analysis and Response,[ FEMA ] – Information Risk and hope to acquire some more down the line…

Professional Track :
# Training and Consulting
# Cyber Crime Investigation and Research
# Computer and Mobile Security/Web Vulnerability

I wish to see myself grow with knowledge each day and attain great heights in all my endeavours.